Pour ses 35 ans, GTI rajeunie avec un nouveau site web!

Découvrir les nouveautés ×
Girl in a jacket Assistance
Girl in a jacket

Cybersecurity: Protect your Company against Informatic Threats

We presented in a previous article, the usual informatics threats. As a technology partner, it’s our duty to transmit good practices in cybersecurity. Although the magnitude and sophistication of the attacks do not stop growing, there are ways to protect ourselves. The implementation of cybersecurity measures inevitably involves the acquisition of adapted products, but it’s mostly the definition of a cybersecurity policy that will guarantee their excellence.

1. Be Equipped with Efficient Product

Antivirus software allows to detect, and in general prevent malicious informatics programs to penetrate your computer network. The antivirus is responsible for disarming and removing threats such as viruses or worms. To be efficient, it is clear the software must be updated regularly. The firewall is a system that allows you to protect a computer network against intrusion coming from the internet. It is an intermediary between the local network and the external network(s). Depending on the setting of this tool, the firewall will only approve authorized communication or prevent exchanges defined as prohibited.

2. Define a Cybersecurity Policy

Antivirus software and a firewall offer optimal cybersecurity only if they are paired with a well-defined cybersecurity policy. This policy must include:
  • Controlled access to the company’s various information
  • Off-site employee management that connects to the corporate network
  • Continuous updating of the company's databases, particularly at the e-mail level
  • Creation of custom filters for targeting unwanted e-mails
Team training and the prevention imparting good digital practices are essential to raise awareness on the following issues:
  • Opening emails and attachments sent from an unknown email
  • Regular anti-virus updates and reboot.
  • Locking your workstation when you are away

3. The specificity of ransomwares

This cyber threat is currently causing a lot of damage in the digital landscape. Here is a list of special security precautions:
  • Do not pay the ransom claimed. You have no guarantee that your data will be returned
  • Make regular copies of information essential to the survival of your business
  • Use IT experts to assess the critical level of data recovery
  • Report incidents to the Canadian anti-fraud center at 1-888-465-8501 or at http://www.antifraudcentre-centreantifraude.ca/.
To find out more about ransomware, consult our previous article on the topic. At GTI, we offer an unstoppable service to identify the vulnerability of your computer network: the intrusion test network. Our experts use a combination of manuals and automatic tests to access your data. They simulate an intrusion such as it would be done by cybercriminals, but without the consequences.
The Benefit of Network Intrusion Testing for Your Business:
  • Detailed and prioritized information on vulnerability of your infrastructure
  • Avoids cost related to the unavailability of your computer system
  • Protection of your brand image and preservation of the confidence of your customers
  • Respect of regulation concerning privacy regulation
 
ABONNEZ-VOUS À NOTRE INFOLETTRE
Retour en haut